1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
11

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensi

tive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer.
What should you use for this situation?
Computers and Technology
1 answer:
slava [35]3 years ago
3 0

Answer: VLAN

Explanation: VLAN(Virtual local area network) is the network technology that lets the user to connect in a virtual( fake) environment and displaying as if they are working in the LAN environment.

It is the used for obtaining the scalability and protection of information while communication. It also helps in adapting the change that occurs in the network and  nodes of the server. Thus, VLAN is the network that should be used in the business to keep sensitive data secure and hosts of the network to connect and communicate .

You might be interested in
Attackers will sometimes put malware on USB drives and leave them in parking lots
kherson [118]

Answer:

True

Explanation:

a lot of people use this as a way to keep things nice and safe, but sometimes thinks don’t go as planned. Don’t really know how else to answer this lol

6 0
1 year ago
Chill and text part 2<br><br> (TEST) How do i copy apex questions
tresset_1 [31]

Answer:

Oracle doc...

7.3.4 Copying a Database Application Page

You can copy a page from the current application or from another application. During the copy process, you can also copy shared components or change mappings to shared components in the target application.

To copy a page:

Navigate to the application you want to copy to:

Navigate to the Workspace home page.

Click the Application Builder icon.

Select an application.

Select a page.

The Page Definition appears.

In Tree view:

Under Page Rendering, select the page name.

Right-click and select copy.

In Component view:

Under Page, click the Copy icon.

For Copy Page Option, select one of the following:

Page in this application

Page in another application

Follow the on-screen instructions.

8 0
3 years ago
Read 2 more answers
Help ASAP!!Choose all the basic elements of algorithms. A.Selection B.Loops C.Flow Charts D.Sequencing E.Combinations F.Iteratio
serg [7]

Answer:

b c d

Explanation:

8 0
3 years ago
Read 2 more answers
In most operating systems what is running application called?
Likurg_2 [28]

Answer:

I believe it is just a task. Since there exists(on windows) the Task Manager application, where you can stop any running <em>task, </em>I think that they are called tasks

Explanation:

5 0
2 years ago
What kind of software would you use to view and troubleshoot protocol-specific problems such as TCP retries caused by missed ack
sveticcg [70]

Answer:

The kind of software to use is a protocol analyser.

Explanation:

The Protocol analyser, which could either be a hardware or a software is a tool that is used for capturing and analysing signals and also interpreting network traffic over a communication channel or between two or more connected computer systems

Protocol analysers can be used to find out location of problems on Local Area Network by examining flow of traffic.

7 0
3 years ago
Other questions:
  • Numeric data is stored in ___________ for direct processing.
    10·2 answers
  • A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
    15·1 answer
  • What might a programming prefer the top-down approach to programming design?
    10·1 answer
  • When transporting data from real-time applications, such as streaming audio and video, which field in the ipv6 header can be use
    12·1 answer
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a
    12·1 answer
  • Write a string class. To avoid conflicts with other similarly named classes, we will call our version MyString. This object is d
    5·1 answer
  • Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?
    7·2 answers
  • According to the video, which tasks do Police Patrol Officers perform? Select all that apply.
    15·2 answers
  • A field value is currently not in any group. what happens when you try adding it to an existing group?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!